Privacy compliance verification in cryptographic protocols
Data(s) |
01/02/2012
|
---|---|
Resumo |
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/48484/1/48484.pdf DOI:10.1007/978-3-642-35179-2_11 Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276. |
Direitos |
Copyright 2012 Springer |
Fonte |
School of Information Systems; Information Security Institute; Science & Engineering Faculty |
Palavras-Chave | #080203 Computational Logic and Formal Languages #080503 Networking and Communications #Privacy-enhancing protocol #Single sign-on #Coloured Petri Nets #CTL #Cryptographic protocols |
Tipo |
Journal Article |